Using TPMs to Cryptographically Verify Devices at Scale
February 5, 2020
Once a new device leaves IT and enters user hands, maintaining confidence in the security of the device is a challenge. When access to network resources relies on credentials provided by the device, r …